Home :: Books :: Computers & Internet  

Arts & Photography
Audio CDs
Audiocassettes
Biographies & Memoirs
Business & Investing
Children's Books
Christianity
Comics & Graphic Novels
Computers & Internet

Cooking, Food & Wine
Entertainment
Gay & Lesbian
Health, Mind & Body
History
Home & Garden
Horror
Literature & Fiction
Mystery & Thrillers
Nonfiction
Outdoors & Nature
Parenting & Families
Professional & Technical
Reference
Religion & Spirituality
Romance
Science
Science Fiction & Fantasy
Sports
Teens
Travel
Women's Fiction
Cryptography for Visual Basic(r) : A Programmer's Guide to the Microsoft(r) CryptoAPI

Cryptography for Visual Basic(r) : A Programmer's Guide to the Microsoft(r) CryptoAPI

List Price: $49.99
Your Price:
Product Info Reviews

<< 1 2 >>

Rating: 5 stars
Summary: Buy this book if you need rapid results
Review: Credit where it's due - this is a great book for those who need to use cryptography in their VB programs. I started off reading the only other book available on the subject, and got bogged down in loads and loads of details very quickly. The other book focuses too much on the rather cryptic (!) Win32 Crypto API too early and in too great a detail. The Win32 Crypto API is large, messy and counter-intuitive to put it mildly. On the plus side, the other book does seem to cover a bit more, and in some areas in quite a bit more depth, but I would say that Bondi's book is definitely the easier to read and understand of the two. Also, rather than having to build up an object model as you read through the book (and having to type the relevant parts that you need as you go), Bondi's book comes with a very complete - and understandable - object model on CD that shields you from the horrible Crypto API underneath. The idea of cryptography seems quite straightforward at first, but if you need convincing about the need to abstract away all this mess into a nice clean object hierarchy, then take a look at the one that comes with Bondi's book - there's a ton of code in there and most of it is the kind of stuff you couldn't write without a really in-depth knowledge of the Win32 Crypto API. This is what wrappers are for, and Bondi's makes a great job of making the whole mess useable!!! Microsoft could have made the API much easier, especially for those who only want to use a fraction of the services it provides. Unfortunately, Microsoft made the API as something that you can only realistically use via a decent object model, like the one that comes with Bondi's book. The other book stands as a great reference for those who need to go further, but for those who want to understand what the hell's going on and do things quickly without spending ages becoming a guru before you can do anything, Bondi's book is the book of choice. In short, the Win32 Crypto API is a nasty mess. If you are in a position to do so then buy both and read Bondi's book first. But if you are looking to buy just one book, defininitely get this one.

Rating: 5 stars
Summary: Buy this book if you need rapid results
Review: Credit where it's due - this is a great book for those who need to use cryptography in their VB programs. I started off reading the only other book available on the subject, and got bogged down in loads and loads of details very quickly. The other book focuses too much on the rather cryptic (!) Win32 Crypto API too early and in too great a detail. The Win32 Crypto API is large, messy and counter-intuitive to put it mildly. On the plus side, the other book does seem to cover a bit more, and in some areas in quite a bit more depth, but I would say that Bondi's book is definitely the easier to read and understand of the two. Also, rather than having to build up an object model as you read through the book (and having to type the relevant parts that you need as you go), Bondi's book comes with a very complete - and understandable - object model on CD that shields you from the horrible Crypto API underneath. The idea of cryptography seems quite straightforward at first, but if you need convincing about the need to abstract away all this mess into a nice clean object hierarchy, then take a look at the one that comes with Bondi's book - there's a ton of code in there and most of it is the kind of stuff you couldn't write without a really in-depth knowledge of the Win32 Crypto API. This is what wrappers are for, and Bondi's makes a great job of making the whole mess useable!!! Microsoft could have made the API much easier, especially for those who only want to use a fraction of the services it provides. Unfortunately, Microsoft made the API as something that you can only realistically use via a decent object model, like the one that comes with Bondi's book. The other book stands as a great reference for those who need to go further, but for those who want to understand what the hell's going on and do things quickly without spending ages becoming a guru before you can do anything, Bondi's book is the book of choice. In short, the Win32 Crypto API is a nasty mess. If you are in a position to do so then buy both and read Bondi's book first. But if you are looking to buy just one book, defininitely get this one.

Rating: 2 stars
Summary: No samples, no CRL info, and a bad License agreement...
Review: I received my copy of this book about two weeks ago. With only limited knowledge of the Crypto API, I started right in chapter one. Two weeks later I still haven't really gotten to any working sample code as this book covers a *lot* of background info on cryptogrphy.

The wrapper that's included in this book is decent, but most of the functions assume you have the high encryption pack installed on your PC (128-bit IE will do) and the samples just won't work without it. By samples I mean two test apps (!) - there's not a lot of sample code in this book...

Fortunately, the wrapper objects are fairly easy to use and the code is pretty straightforward. Unfortunately, there's not a single bit of information about CRL (certificate revoke lists) in this book, a piece that I needed more than anything.

I'd strongly suggest getting the Sams book "Developing Secure Applications with Visual Basic" and using their wrapper code. Luckily the Sams book includes samples with each chapter, delving into each topic separately (hashes, certs, etc.) so you can understand why you're learning about each subject.

A big limitation of this book is the "Wiley Open Source License" that you must abide by to use the wrapper COM objects - and of course, the entire book is based on these objects. Sections 3.2 and 3.3 of their license states that if you distribute a compiled version of their code, with or without changes, you must also provide two things: the source code (with the executable or a free way to get the source code for your version) and a document describing the changes you made, including dates of the changes. While they may have implied that this source is only necessary for people contributing to the Open Source project, it never says this in the license.

Easy summary: buy the Sams book, you'll thank me.

Rating: 5 stars
Summary: Second to None
Review: I simply cannot say enough about this book or the author. Richard Bondi has been very responsive to any questions that have been posed on his bulletin board. The book covered pretty much exactly what we needed to know and the sample code was very thorough and well thought out. If anything is lacking in the book, it's some implementation details, such as key security. But, the book "Applied Cryptography" by Bruce Schneier helped a bit on this one.

Rating: 5 stars
Summary: Second to None
Review: I simply cannot say enough about this book or the author. Richard Bondi has been very responsive to any questions that have been posed on his bulletin board. The book covered pretty much exactly what we needed to know and the sample code was very thorough and well thought out. If anything is lacking in the book, it's some implementation details, such as key security. But, the book "Applied Cryptography" by Bruce Schneier helped a bit on this one.

Rating: 5 stars
Summary: Crypto for the Masses! Great!
Review: I've read both this book (Bondi's) and the only other VB crypto book currently in print, Davis Chapman's "Developing Secure Applications with VB." In my opinion, you'll want to buy both books. Chapman's covers more, but it is hard to really understand the underlying cryptography because it is introduced as you go along, in small pieces. And while Chapman shows you how to call all of the CryptoAPI, the CryptoAPI itself comes across as bizarre and illogical. Bondi's first two chapters fix all that, describing cryptography and the CryptoAPI in depth and really clearly. You could read them and then just start using Bondi's COM objects on the CD if you wanted to; they are much more full-featured than Chapman's example code. The rest of Bondi's book describes the guts of his objects, with a lot of vb tricks. The Open Source license the objects come with is a standard one from..., the Ricoh license, so I have no problem with it. There's also a site www.cryptovb.com that has extra examples for Bondi's code. One problem that Bondi highlights in the introduction is that his code doesn't include certificates; but from Chapman's chapter on them, that would be pretty easy to add.

Rating: 5 stars
Summary: Crypto for the Masses! Great!
Review: I've read both this book (Bondi's) and the only other VB crypto book currently in print, Davis Chapman's "Developing Secure Applications with VB." In my opinion, you'll want to buy both books. Chapman's covers more, but it is hard to really understand the underlying cryptography because it is introduced as you go along, in small pieces. And while Chapman shows you how to call all of the CryptoAPI, the CryptoAPI itself comes across as bizarre and illogical. Bondi's first two chapters fix all that, describing cryptography and the CryptoAPI in depth and really clearly. You could read them and then just start using Bondi's COM objects on the CD if you wanted to; they are much more full-featured than Chapman's example code. The rest of Bondi's book describes the guts of his objects, with a lot of vb tricks. The Open Source license the objects come with is a standard one from..., the Ricoh license, so I have no problem with it. There's also a site www.cryptovb.com that has extra examples for Bondi's code. One problem that Bondi highlights in the introduction is that his code doesn't include certificates; but from Chapman's chapter on them, that would be pretty easy to add.

Rating: 1 stars
Summary: Sample codes doen't work
Review: Recomiendo este libro a aquellas personas que están intesadas en la implantacón de soluciones basadas en criptografia pero que no quieren involucrarse en la teoria que sustentan dichas API. Si bien el libro está orientado a soluciones basadas en Visual Basic, éstas pueden ser implantadas con otros lenguajes de programcaión basados en WINTEL tales como Power Builder, C++ Builder y otros.

Rating: 5 stars
Summary: Excelente
Review: Recomiendo este libro a aquellas personas que están intesadas en la implantacón de soluciones basadas en criptografia pero que no quieren involucrarse en la teoria que sustentan dichas API. Si bien el libro está orientado a soluciones basadas en Visual Basic, éstas pueden ser implantadas con otros lenguajes de programcaión basados en WINTEL tales como Power Builder, C++ Builder y otros.

Rating: 5 stars
Summary: Excelente
Review: Recomiendo este libro a aquellas personas que están intesadas en la implantacón de soluciones basadas en criptografia pero que no quieren involucrarse en la teoria que sustentan dichas API. Si bien el libro está orientado a soluciones basadas en Visual Basic, éstas pueden ser implantadas con otros lenguajes de programcaión basados en WINTEL tales como Power Builder, C++ Builder y otros.


<< 1 2 >>

© 2004, ReviewFocus or its affiliates